Chapter 5: Network security technologies Flashcards

1
Q

Which systems are designed to monitor network traffic and other events, and look for anything suspicious that might indicate an attack?

A

Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What intrusion detection method examines traffic by comparison to a profile of how its protocol is supposed to work

A

Stateful protocol analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which intrusion detection method uses heuristic methods that look for behaviors which seems unusual relative to the normal baseline. It has the ability to identify zero day attacks.

A

Anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term refers to the combination of AAA systems with network segmentation and host-level security?

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the term for appliances, hardware or software designed to transparently combine distributed services into a single virtual whole?

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which load balancing technique moves the processing overhead associated with SSL or TLS encryption to another server or a hardware appliance with accelerate encryption features?

A

SSL acceleration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which load balancing technique reduces the bandwidth required by some kinds of data traffic

A

Data compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which load balancing technique monitors each server in the load balancing pool, then removes it if it fails

A

Health checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which load balancing technique moves resource intensive TCP services to different servers than those performing server application functions

A

TCP offloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which load balancing technique is similar to QOS, and allows some traffic to be prioritized

A

Priority queuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which load balancing technique allows the balancer to store frequently accessed content?

A

Content caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which load balancer configuration makes sure that incoming connections are spread evenly throughout servers without overloading any of them?

A

scheduling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which load balancer configuration allows “sticky” sessions to enable traffic fro the same user to go to the same server to maintain session integrity?

A

sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which load balancer failover technique keeps all redundant servers active and sharing the load?

A

active/active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which load balancer failover technique keeps multiple failover nodes on standby?

A

active/passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which proxy mediates communications between LAN clients and Internet servers. It requires client side configuration, and is often used in small, heavily secured networks.

A

Forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which proxy operates like forward proxies, but don’t require client side configuration?

A

Transparent proxies (also known as forced proxies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which proxy mediates communications between Internet clients and LAN servers?

A

Reverse proxies

19
Q

Which proxy is hosted on the internet and masks the client’s original IP address from the server?

A

Anonymous proxy

20
Q

Which tool combines multiple security functions into a single device.

A

Unified Threat Management (UTM)/Next-generation firewalls (NGFW)

21
Q

Which monitoring tool can read packet headers to determine traffic patterns or view protocol information in depth?

A

Network analyzer (aka: packet analyzer or protocol analyzer)

22
Q

Which monitoring tool can be used to find performance issues or detect unexpected traffic?

A

Bandwidth monitor

23
Q

Which monitoring tool is a port on a switch or other network device configured to copy traffic on other links and forward it to a logging analysis system.

A

Port mirror (aka: Switched port analyzer)

24
Q

Which monitoring tool is a hardware device designed to perform port mirroring? It has an A port, a B port, and a monitor port

A

Network tap

25
Q

Which tool combines input from port mirrors and taps across the network, then filters the raw data before feeding it into a monitoring system

A

Traffic aggregator

26
Q

Which monitoring tool receives, stores and preprocesses networking monitoring data, especially in the context of Netflow analysis. Might lie between a traffic aggregator an analysis software

A

Collector

27
Q

Which monitoring tool finds congestion, reception, and coverage area and detects rogue APs

A

Wireless analyzers

28
Q

Which monitoring tool remotely manages network devices, but also gathers network information

A

SNMP

29
Q

Which monitoring tool is a central solution that actively monitors and reports on data collected by logging tools?

A

Security Information and Event Management (SIEM)

30
Q

Which monitoring tool detects temperature, humidity, or electric power quality

A

Physical sensor

31
Q

in SNMP, which entity is described by SNMP software running on a manged device?

A

Agent

32
Q

in SNMP, which entity is a software application used to manage agents.

A

Manager (aka: Network Management System NMS)

33
Q

In SNMP, what is a unique number corresponding to a property that be monitored on a single device?

A

Object Identifier

34
Q

In SNMP, what is a database containing OIDs for managed devices, arranged in a tree-like hierarchical fashion.

A

Management Information Base (MIB)

35
Q

Which version of SNMP is the most secure?

A

version 3

36
Q

Which monitoring tool provides real time traffic reporting? Devices (called flow exporters) identify network flows and send data about them to a centralized flow collector where it is processed and stored.

A

Netflow

37
Q

Which network analysis technique finds increases, decreases or predictable patterns.

A

Trend analysis

38
Q

Which network analysis technique compares data to an established baseline

A

Anomaly analysis

39
Q

Which network analysis technique compares new data against known threats to find similar behaviors even without an exact treat signature

A

Heuristic analysis

40
Q

Which network analysis technique collects user behavior data and then uses it to recognize unusual actions that might represent a security incident?

A

User and entity behavioral analytics (UEBA)

41
Q

Which network analysis technique uses text analysis and natural language processing to determine the emotional state of words and speech?

A

Sentiment analysis

42
Q

Which technique uses synthetic network traffic that resembles genuine communications. It’s often used by distributed honeypots to emulate regular network activity and make decoy systems less suspicious
to an attacker, but normal devices can also generate it in addition to their other communications.

A

Fake telemetry

43
Q

Which technique DNS requests from malware and and responds with deliberately incorrect data?

A

DNS sinkhole